Advanced persistent attack News
March 12, 2018
New research claims Olympic Destroyer was not the work of the North Korea-backed Lazarus Group; rather, it was a false flag cyberattack designed to mislead attribution efforts.
March 08, 2018
Researchers discovered evidence of an NSA tracking program designed to watch nation-state hackers and gather information as attacks were in progress.
October 24, 2017
The Department of Homeland Security released an alert confirming the Dragonfly ICS cyberattack campaign, but experts said more action is needed to protect critical infrastructure.
August 11, 2017
Dell SecureWorks researchers detected suspicious activity on social media accounts of Mia Ash. When they dug deeper, they discovered a new, complex social engineering attack.
Advanced persistent attack Get Started
Bring yourself up to speed with our introductory content
More enterprises mulling the move to Office 365 should factor in the adjustments necessary to get the IT department up to speed to manage the platform properly. Continue Reading
As global cyberattacks have exploded in recent months, the speed of infection is causing damage, not only to targeted industries and nation states, but to corporate valuations. In June, FedEx warned that the Petya cyberattack, which disrupted operations at its TNT Express subsidiary, may have "material impact" on the company's 2017 financial performance. Merck & Co. Inc., another victim of the cyberattack, issued a similar warning. A Trojan that morphed into a worm, Petya -- sometimes called NotPetya -- brought increased attention to the lack of security fundamentals practiced at major companies.
The majority of these threats enter networks through malware delivered via the internet. However, as the growth of HTTPS deployment continues, some companies are increasingly using Transport Layer Security (TLS) interception by middleboxes to maintain visibility into TLS security and malicious software. Researchers from top universities and technology companies, including Google, Mozilla and Cloudflare, published an HTTPS interception study in April that offered startling statistics on TLS security.
In this issue of Information Security magazine, we look at how worms play a role in advanced persistent threats and the ongoing issues related to HTTPS inspection and TLS security.Continue Reading
In this excerpt from chapter seven of Advanced Persistent Security, authors Araceli Treu Gomes and Ira Winkler discuss the different threats facing organizations. Continue Reading
Evaluate Advanced persistent attack Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The growth in devices on the network has heightened the need for network access control products. This article presents scenarios where an enterprise might need an NAC system. Continue Reading
Advanced endpoint protection is arriving from all quarters -- machine learning, crafty sandboxes, behavior analytics. Learn how tech advances are being applied to endpoints. Continue Reading
Email attacks are getting more intricate, forcing Microsoft to reinforce its security services to protect end users. How well do you know the Office 365 Advanced Threat Protection features? Continue Reading
Manage Advanced persistent attack
Learn to apply best practices and optimize your operations.
A vast majority of APT attacks and malware delivery happens via spear phishing. But worms have always had a place in the toolkit when the delivery method fit the mission. Continue Reading
Thanks to the MS Learning email blast, I can report that MVA offers free Win10 security course. Over 2-1/2 hours of free video training, in fact. Continue Reading
As hospitals continue to face ongoing cyberthreats, advanced threat protection tools that filter email and monitor network behavior can help reduce the risk of attacks. Continue Reading
Problem Solve Advanced persistent attack Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Why nation-state attribution plays a major role in the U.S. government's willingness to share cyberthreat intelligence with private-sector companies. Continue Reading
APT groups have been continuously exploiting a flaw in Microsoft Office, despite it having been patched. Expert Nick Lewis explains how these attacks work and how to prevent them. Continue Reading
Advanced persistent threats are a constant risk for enterprises, so the board needs to know about them. Expert Mike O. Villegas discusses how to effectively communicate about APTs. Continue Reading